{"id":112060,"date":"2026-02-09T11:00:00","date_gmt":"2026-02-09T11:00:00","guid":{"rendered":"https:\/\/www.artificialintelligence-news.com\/?p=112060"},"modified":"2026-02-09T09:15:39","modified_gmt":"2026-02-09T09:15:39","slug":"chinese-ai-models-175k-unprotected-systems-western-retreat","status":"publish","type":"post","link":"https:\/\/www.artificialintelligence-news.com\/news\/chinese-ai-models-175k-unprotected-systems-western-retreat\/","title":{"rendered":"Exclusive: Why are Chinese AI models dominating open-source as Western labs step back?"},"content":{"rendered":"\n<p>Because Western AI labs&nbsp;won&#8217;t\u2014or&nbsp;can&#8217;t\u2014anymore. As OpenAI, Anthropic, and Google face mounting pressure to restrict their most powerful models, Chinese developers have filled the open-source void with AI explicitly built for what operators need: powerful models that run on commodity hardware.<\/p>\n\n\n\n<p>A new security&nbsp;<a target=\"_blank\" href=\"https:\/\/www.sentinelone.com\/labs\/silent-brothers-ollama-hosts-form-anonymous-ai-network-beyond-platform-guardrails\/\" rel=\"noreferrer noopener\">study<\/a>&nbsp;reveals just how thoroughly Chinese AI has captured this space.&nbsp;Research published by SentinelOne and Censys,&nbsp;mapping&nbsp;175,000 exposed AI hosts across 130 countries over 293 days, shows&nbsp;Alibaba&#8217;s&nbsp;Qwen2 consistently&nbsp;ranking&nbsp;second only&nbsp;to&nbsp;Meta&#8217;s&nbsp;Llama in global deployment.&nbsp;More tellingly, the Chinese model appears on 52% of systems running multiple AI models\u2014suggesting&nbsp;it&#8217;s&nbsp;become the de facto alternative to Llama.<\/p>\n\n\n\n<p>&#8220;Over the next 12\u201318 months, we expect Chinese-origin model families to play an increasingly central role in the open-source LLM ecosystem, particularly as Western frontier labs slow or constrain open-weight releases,&#8221;&nbsp;Gabriel Bernadett-Shapiro, distinguished AI research scientist at SentinelOne, told TechForge&nbsp;Media&#8217;s&nbsp;<em>AI News<\/em>.<\/p>\n\n\n\n<p>The finding arrives as OpenAI, Anthropic, and Google face regulatory scrutiny, safety review overhead, and commercial incentives pushing them toward API-gated releases rather than publishing model weights&nbsp;freely.&nbsp;The contrast with Chinese developers&nbsp;couldn&#8217;t&nbsp;be sharper.<\/p>\n\n\n\n<p>Chinese labs have demonstrated what Bernadett-Shapiro calls&nbsp;&#8220;a willingness to publish large, high-quality weights that&nbsp;are explicitly optimised&nbsp;for local deployment, quantisation, and commodity hardware.&#8221;<\/p>\n\n\n\n<p>&#8220;In practice, this makes them easier to adopt, easier to run, and easier to integrate into edge and residential environments,\u201d&nbsp;he added.<\/p>\n\n\n\n<p>Put simply: if&nbsp;you&#8217;re&nbsp;a researcher or developer wanting to run powerful AI on your own computer without a massive budget, Chinese models like Qwen2 are often your best\u2014or only\u2014option.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-pragmatics-not-ideology\">Pragmatics, not ideology<\/h3>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"719\" src=\"https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2026\/02\/Silent_Brothers_Chart_01-12-2026_03-scaled.jpg-1024x719.avif\" alt=\"\" class=\"wp-image-112062\" srcset=\"https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2026\/02\/Silent_Brothers_Chart_01-12-2026_03-scaled.jpg-1024x719.avif 1024w, https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2026\/02\/Silent_Brothers_Chart_01-12-2026_03-scaled.jpg-300x211.avif 300w, https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2026\/02\/Silent_Brothers_Chart_01-12-2026_03-scaled.jpg-768x539.avif 768w, https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2026\/02\/Silent_Brothers_Chart_01-12-2026_03-scaled.jpg-1536x1079.avif 1536w, https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2026\/02\/Silent_Brothers_Chart_01-12-2026_03-scaled.jpg-2048x1438.avif 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Alibaba&#8217;s Qwen2 consistently ranks second only to Meta&#8217;s Llama across 175,000 exposed hosts globally. Source: SentinelOne\/Censys<\/em><\/figcaption><\/figure>\n\n\n\n<p>The research shows this dominance&nbsp;isn&#8217;t&nbsp;accidental. Qwen2 maintains what Bernadett-Shapiro calls&nbsp;&#8220;zero rank volatility&#8221;\u2014it holds the number two position across every measurement method the researchers examined: total observations, unique hosts, and host-days.&nbsp;There&#8217;s&nbsp;no fluctuation, no regional variation, just consistent global adoption.<\/p>\n\n\n\n<p>The co-deployment pattern is equally revealing. When operators run multiple AI models on the same system\u2014a common practice for comparison or workload segmentation\u2014the pairing of Llama and Qwen2 appears on 40,694 hosts, representing 52% of all multi-family deployments.<\/p>\n\n\n\n<p>Geographic concentration reinforces the picture. In China, Beijing alone accounts for 30% of exposed hosts, with Shanghai and Guangdong&nbsp;adding another&nbsp;21% combined.&nbsp;In the United States, Virginia\u2014reflecting AWS infrastructure&nbsp;density\u2014represents 18% of hosts.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"719\" src=\"https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2026\/02\/Silent_Brothers_Chart_01-12-2026_02-scaled.jpg-1024x719.avif\" alt=\"\" class=\"wp-image-112061\" srcset=\"https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2026\/02\/Silent_Brothers_Chart_01-12-2026_02-scaled.jpg-1024x719.avif 1024w, https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2026\/02\/Silent_Brothers_Chart_01-12-2026_02-scaled.jpg-300x211.avif 300w, https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2026\/02\/Silent_Brothers_Chart_01-12-2026_02-scaled.jpg-768x539.avif 768w, https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2026\/02\/Silent_Brothers_Chart_01-12-2026_02-scaled.jpg-1536x1079.avif 1536w, https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2026\/02\/Silent_Brothers_Chart_01-12-2026_02-scaled.jpg-2048x1438.avif 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>China and the US dominate exposed Ollama host distribution, with Beijing accounting for 30% of Chinese deployments. Source: SentinelOne\/Censys<\/em><\/figcaption><\/figure>\n\n\n\n<p>&#8220;If release velocity, openness, and hardware portability continue to diverge between regions, Chinese model lineages are likely to become the default for open deployments, not because of ideology, but because of availability and pragmatics,&#8221;&nbsp;Bernadett-Shapiro explained.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-the-governance-problem\">The governance problem<\/h3>\n\n\n\n<p>This shift creates what Bernadett-Shapiro characterises as a&nbsp;&#8220;governance inversion&#8221;\u2014a fundamental reversal of how AI risk and accountability&nbsp;are distributed.<\/p>\n\n\n\n<p>In platform-hosted services like ChatGPT, one company controls everything: the infrastructure, monitors usage, implements safety controls, and can shut down&nbsp;abuse. With open-weight models, the control evaporates. Accountability diffuses across thousands of networks in 130 countries, while dependency concentrates upstream in a handful of model suppliers\u2014increasingly Chinese ones.<\/p>\n\n\n\n<p>The 175,000 exposed hosts operate entirely outside the control systems governing commercial AI platforms.&nbsp;There&#8217;s&nbsp;no centralised authentication, no rate limiting, no abuse detection, and critically, no kill switch if misuse is detected.<\/p>\n\n\n\n<p>&#8220;Once an open-weight model is released, it is trivial to remove safety or security training,&#8221;&nbsp;Bernadett-Shapiro noted.&#8221;Frontier labs need to treat open-weight releases as long-lived infrastructure artefacts.&#8221;<\/p>\n\n\n\n<p>A persistent backbone of 23,000 hosts&nbsp;showing 87%&nbsp;average uptime drives the majority of activity.&nbsp;These&nbsp;aren&#8217;t&nbsp;hobbyist experiments\u2014they&#8217;re&nbsp;operational systems providing ongoing utility, often running multiple models simultaneously.<\/p>\n\n\n\n<p>Perhaps most concerning:&nbsp;between 16% and 19% of the infrastructure&nbsp;couldn&#8217;t&nbsp;be attributed to any identifiable owner.&#8221;Even if we are able to prove that&nbsp;a model was leveraged&nbsp;in an attack, there are not well-established abuse reporting routes,&#8221;&nbsp;Bernadett-Shapiro said.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-security-without-guardrails\">Security without guardrails<\/h3>\n\n\n\n<p>Nearly half (48%) of exposed hosts advertise&nbsp;&#8220;tool-calling capabilities&#8221;\u2014meaning&nbsp;they&#8217;re&nbsp;not just generating text. They can execute code, access APIs, and interact with external systems autonomously.<\/p>\n\n\n\n<p>&#8220;A&nbsp;text-only model can generate harmful content, but a tool-calling model can act,&#8221;&nbsp;Bernadett-Shapiro explained.&nbsp;&#8220;On an unauthenticated server, an attacker&nbsp;doesn&#8217;t&nbsp;need malware or credentials; they just need a prompt.&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"719\" src=\"https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2026\/02\/Silent_Brothers_Chart_01-12-2026_01-scaled.jpg-1024x719.avif\" alt=\"\" class=\"wp-image-112064\" srcset=\"https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2026\/02\/Silent_Brothers_Chart_01-12-2026_01-scaled.jpg-1024x719.avif 1024w, https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2026\/02\/Silent_Brothers_Chart_01-12-2026_01-scaled.jpg-300x211.avif 300w, https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2026\/02\/Silent_Brothers_Chart_01-12-2026_01-scaled.jpg-768x539.avif 768w, https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2026\/02\/Silent_Brothers_Chart_01-12-2026_01-scaled.jpg-1536x1079.avif 1536w, https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2026\/02\/Silent_Brothers_Chart_01-12-2026_01-scaled.jpg-2048x1438.avif 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Nearly half of exposed Ollama hosts have tool-calling capabilities that can execute code and access external systems. Source: SentinelOne\/Censys<\/em><\/figcaption><\/figure>\n\n\n\n<p>The highest-risk scenario involves what he calls&nbsp;&#8220;exposed, tool-enabled RAG or automation endpoints being driven remotely as an execution layer.&#8221;&nbsp;An attacker could&nbsp;simply&nbsp;ask the model to summarise internal documents, extract API keys from code repositories, or call downstream services the model&nbsp;is configured&nbsp;to access.<\/p>\n\n\n\n<p>When paired with&nbsp;&#8220;thinking&#8221;&nbsp;models optimised for multi-step reasoning\u2014present on 26% of hosts\u2014the system can plan complex operations autonomously. The researchers identified at least 201 hosts running&nbsp;&#8220;uncensored&#8221;&nbsp;configurations that explicitly remove safety guardrails, though Bernadett-Shapiro notes this represents a lower bound.<\/p>\n\n\n\n<p>In other words, these&nbsp;aren&#8217;t&nbsp;just chatbots\u2014they&#8217;re&nbsp;AI systems that can take action, and half of them have no password protection.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-what-frontier-labs-should-do\">What frontier labs should do<\/h3>\n\n\n\n<p>For Western AI developers concerned about maintaining influence over the&nbsp;technology&#8217;s&nbsp;trajectory, Bernadett-Shapiro recommends a different approach to model releases.<\/p>\n\n\n\n<p>&#8220;Frontier labs&nbsp;can&#8217;t&nbsp;control deployment, but they can shape the risks that they release into the world,&#8221;&nbsp;he said. That includes&nbsp;&#8220;investing in post-release monitoring of ecosystem-level adoption and misuse patterns&#8221;&nbsp;rather than treating releases as one-off research outputs.<\/p>\n\n\n\n<p>The current governance model assumes centralised deployment with diffuse upstream supply\u2014the exact opposite of&nbsp;what&#8217;s&nbsp;actually happening.&nbsp;&#8220;When a small number of lineages dominate&nbsp;what&#8217;s&nbsp;runnable on commodity hardware, upstream decisions get amplified everywhere,&#8221;&nbsp;he explained.&nbsp;&#8220;Governance strategies must acknowledge that inversion.&#8221;<\/p>\n\n\n\n<p>But acknowledgement requires visibility. Currently, most labs releasing open-weight models have no systematic way to track how&nbsp;they&#8217;re&nbsp;being used, where&nbsp;they&#8217;re&nbsp;deployed, or whether safety training remains intact after quantisation and fine-tuning.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-the-12-18-month-outlook\">The 12-18 month outlook<\/h3>\n\n\n\n<p>Bernadett-Shapiro expects the exposed layer to&nbsp;&#8220;persist and professionalise&#8221;&nbsp;as tool use, agents, and multimodal inputs become default capabilities rather than exceptions.&nbsp;The transient edge will&nbsp;keep churning&nbsp;as hobbyists experiment, but the backbone will&nbsp;grow&nbsp;more stable, more capable, and&nbsp;handle&nbsp;more sensitive data.<\/p>\n\n\n\n<p>Enforcement will remain uneven because residential and small VPS deployments&nbsp;don&#8217;t&nbsp;map to existing governance controls.&nbsp;&#8220;This&nbsp;isn&#8217;t&nbsp;a misconfiguration problem,&#8221;&nbsp;he emphasised.&nbsp;&#8220;We are observing the early formation of a public, unmanaged AI compute substrate. There is no central switch to flip.&#8221;<\/p>\n\n\n\n<p>The geopolitical dimension adds urgency.&nbsp;&#8220;When most of the&nbsp;world&#8217;s&nbsp;unmanaged AI compute depends on models released by a handful of non-Western labs, traditional assumptions about influence, coordination, and post-release response become weaker,&#8221;&nbsp;Bernadett-Shapiro said.<\/p>\n\n\n\n<p>For Western developers and policymakers, the implication is stark:&nbsp;&#8220;Even perfect governance of their own platforms has limited impact on the real-world risk surface if the dominant capabilities live elsewhere and propagate through open, decentralised infrastructure.&#8221;<\/p>\n\n\n\n<p>The open-source AI ecosystem is globalising, but its centre of gravity is shifting decisively eastward. Not&nbsp;through any coordinated strategy, but through the practical economics of&nbsp;who&#8217;s&nbsp;willing to publish what researchers and operators actually need to run AI locally.<\/p>\n\n\n\n<p>The 175,000 exposed hosts mapped in this study are just the visible surface of that fundamental realignment\u2014one that Western policymakers are only beginning to recognise, let alone address.<\/p>\n\n\n\n<p><strong>See also: <a href=\"https:\/\/www.artificialintelligence-news.com\/news\/huawei-open-source-ai-development-platform-technical-specs\/\">Huawei details open-source AI development roadmap at Huawei Connect 2025<\/a><\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><a href=\"https:\/\/www.ai-expo.net\/?utm_source=AI-News&amp;utm_medium=Footer-banner&amp;utm_campaign=world-series\"><img loading=\"lazy\" decoding=\"async\" width=\"728\" height=\"90\" src=\"https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2026\/01\/image-3.png\" alt=\"Banner for AI &amp; Big Data Expo by TechEx events.\" class=\"wp-image-111908\" style=\"width:800px;height:auto\" srcset=\"https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2026\/01\/image-3.png 728w, https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2026\/01\/image-3-300x37.png 300w\" sizes=\"(max-width: 728px) 100vw, 728px\" \/><\/a><\/figure>\n\n\n\n<p><strong>Want to learn more about AI and big data from industry leaders?<\/strong> Check out <a href=\"https:\/\/www.ai-expo.net\/?utm_source=AI-News&amp;utm_medium=Footer-banner&amp;utm_campaign=world-series\">AI &amp; Big Data Expo<\/a> taking place in Amsterdam, California, and London. The comprehensive event is part of <a href=\"https:\/\/techexevent.com\/?utm_source=AI-News&amp;utm_medium=Footer-banner&amp;utm_campaign=world-series\">TechEx<\/a> and is co-located with other leading technology events including the <a href=\"https:\/\/cybersecuritycloudexpo.com\/?utm_source=CloudTech-News&amp;utm_medium=Footer-banner&amp;utm_campaign=world-series\">Cyber Security &amp; Cloud Expo<\/a>. Click <a href=\"https:\/\/techexevent.com\/?utm_source=AI-News&amp;utm_medium=Footer-banner&amp;utm_campaign=world-series\">here<\/a> for more information.<\/p>\n\n\n\n<p>AI News is powered by <a href=\"https:\/\/techforge.pub\/?utm_source=AI-News&amp;utm_medium=Footer-banner&amp;utm_campaign=world-series\">TechForge Media<\/a>. Explore other upcoming enterprise technology events and webinars <a href=\"https:\/\/techforge.pub\/events\/?utm_source=AI-News&amp;utm_medium=Footer-banner&amp;utm_campaign=world-series\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Because Western AI labs&nbsp;won&#8217;t\u2014or&nbsp;can&#8217;t\u2014anymore. As OpenAI, Anthropic, and Google face mounting pressure to restrict their most powerful models, Chinese developers have filled the open-source void with AI explicitly built for what operators need: powerful models that run on commodity hardware. A new security&nbsp;study&nbsp;reveals just how thoroughly Chinese AI has captured this space.&nbsp;Research published by SentinelOne [&hellip;]<\/p>\n","protected":false},"author":60725,"featured_media":112065,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3333,3335,1,3371,3337,3336,3339],"tags":[186,192,1962],"ppma_author":[2975],"class_list":["post-112060","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai-and-us","category-ai-in-action","category-artificial-intelligence","category-deep-dives","category-features","category-inside-ai","category-open-source-democratised-ai","tag-ai","tag-artificial-intelligence","tag-open-source"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Exclusive: Chinese AI Models Power 175,000 Unprotected Systems as Western Labs Pull Back<\/title>\n<meta name=\"description\" content=\"Chinese AI models like Qwen2 now dominate 175,000 exposed systems globally as Western labs face regulatory pressure. Exclusive study reveals security risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.artificialintelligence-news.com\/news\/chinese-ai-models-175k-unprotected-systems-western-retreat\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Exclusive: Why are Chinese AI models dominating open-source as Western labs step back?\" \/>\n<meta property=\"og:description\" content=\"Chinese AI models like Qwen2 now dominate 175,000 exposed systems globally as Western labs face regulatory pressure. Exclusive study reveals security risks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.artificialintelligence-news.com\/news\/chinese-ai-models-175k-unprotected-systems-western-retreat\/\" \/>\n<meta property=\"og:site_name\" content=\"AI News\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/AITechNews\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-09T11:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2026\/02\/markus-spiske-Skf7HxARcoc-unsplash-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dashveenjit Kaur\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ai_technews\" \/>\n<meta name=\"twitter:site\" content=\"@ai_technews\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dashveenjit Kaur\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.artificialintelligence-news.com\/news\/chinese-ai-models-175k-unprotected-systems-western-retreat\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.artificialintelligence-news.com\/news\/chinese-ai-models-175k-unprotected-systems-western-retreat\/\"},\"author\":{\"name\":\"Dashveenjit Kaur\",\"@id\":\"https:\/\/www.ianj52.sg-host.com\/#\/schema\/person\/dae220ab53e21abc50852ff292dab19f\"},\"headline\":\"Exclusive: Why are Chinese AI models dominating open-source as Western labs step back?\",\"datePublished\":\"2026-02-09T11:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.artificialintelligence-news.com\/news\/chinese-ai-models-175k-unprotected-systems-western-retreat\/\"},\"wordCount\":1459,\"publisher\":{\"@id\":\"https:\/\/www.ianj52.sg-host.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.artificialintelligence-news.com\/news\/chinese-ai-models-175k-unprotected-systems-western-retreat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2026\/02\/markus-spiske-Skf7HxARcoc-unsplash-scaled.jpg\",\"keywords\":[\"ai\",\"artificial intelligence\",\"open-source\"],\"articleSection\":[\"AI and Us\",\"AI in Action\",\"Artificial Intelligence\",\"Deep Dives\",\"Features\",\"Inside AI\",\"Open-Source &amp; Democratised AI\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.artificialintelligence-news.com\/news\/chinese-ai-models-175k-unprotected-systems-western-retreat\/\",\"url\":\"https:\/\/www.artificialintelligence-news.com\/news\/chinese-ai-models-175k-unprotected-systems-western-retreat\/\",\"name\":\"Exclusive: Chinese AI Models Power 175,000 Unprotected Systems as Western Labs Pull Back\",\"isPartOf\":{\"@id\":\"https:\/\/www.ianj52.sg-host.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.artificialintelligence-news.com\/news\/chinese-ai-models-175k-unprotected-systems-western-retreat\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.artificialintelligence-news.com\/news\/chinese-ai-models-175k-unprotected-systems-western-retreat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2026\/02\/markus-spiske-Skf7HxARcoc-unsplash-scaled.jpg\",\"datePublished\":\"2026-02-09T11:00:00+00:00\",\"description\":\"Chinese AI models like Qwen2 now dominate 175,000 exposed systems globally as Western labs face regulatory pressure. Exclusive study reveals security risks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.artificialintelligence-news.com\/news\/chinese-ai-models-175k-unprotected-systems-western-retreat\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.artificialintelligence-news.com\/news\/chinese-ai-models-175k-unprotected-systems-western-retreat\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.artificialintelligence-news.com\/news\/chinese-ai-models-175k-unprotected-systems-western-retreat\/#primaryimage\",\"url\":\"https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2026\/02\/markus-spiske-Skf7HxARcoc-unsplash-scaled.jpg\",\"contentUrl\":\"https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2026\/02\/markus-spiske-Skf7HxARcoc-unsplash-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Photo by Markus Spiske\/Unsplash\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.artificialintelligence-news.com\/news\/chinese-ai-models-175k-unprotected-systems-western-retreat\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.artificialintelligence-news.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Exclusive: Why are Chinese AI models dominating open-source as Western labs step back?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ianj52.sg-host.com\/#website\",\"url\":\"https:\/\/www.ianj52.sg-host.com\/\",\"name\":\"AI News\",\"description\":\"Artificial Intelligence News\",\"publisher\":{\"@id\":\"https:\/\/www.ianj52.sg-host.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ianj52.sg-host.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ianj52.sg-host.com\/#organization\",\"name\":\"AI News\",\"url\":\"https:\/\/www.ianj52.sg-host.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.ianj52.sg-host.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2025\/01\/AI-News.png\",\"contentUrl\":\"https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2025\/01\/AI-News.png\",\"width\":1245,\"height\":238,\"caption\":\"AI News\"},\"image\":{\"@id\":\"https:\/\/www.ianj52.sg-host.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/AITechNews\/\",\"https:\/\/x.com\/ai_technews\",\"https:\/\/www.linkedin.com\/groups\/1906826\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ianj52.sg-host.com\/#\/schema\/person\/dae220ab53e21abc50852ff292dab19f\",\"name\":\"Dashveenjit Kaur\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.ianj52.sg-host.com\/#\/schema\/person\/image\/3e6156030d4e3981e2369d58108e0c16\",\"url\":\"https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2024\/06\/dashveenjit-profile.jpeg\",\"contentUrl\":\"https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2024\/06\/dashveenjit-profile.jpeg\",\"caption\":\"Dashveenjit Kaur\"},\"description\":\"Dashveenjit is an experienced tech and business journalist with a determination to find and produce stories for online and print daily. She is also an experienced parliament reporter with occasional pursuits in the lifestyle and art industries.\",\"url\":\"https:\/\/www.artificialintelligence-news.com\/news\/author\/dashveenjit\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Exclusive: Chinese AI Models Power 175,000 Unprotected Systems as Western Labs Pull Back","description":"Chinese AI models like Qwen2 now dominate 175,000 exposed systems globally as Western labs face regulatory pressure. Exclusive study reveals security risks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.artificialintelligence-news.com\/news\/chinese-ai-models-175k-unprotected-systems-western-retreat\/","og_locale":"en_GB","og_type":"article","og_title":"Exclusive: Why are Chinese AI models dominating open-source as Western labs step back?","og_description":"Chinese AI models like Qwen2 now dominate 175,000 exposed systems globally as Western labs face regulatory pressure. Exclusive study reveals security risks.","og_url":"https:\/\/www.artificialintelligence-news.com\/news\/chinese-ai-models-175k-unprotected-systems-western-retreat\/","og_site_name":"AI News","article_publisher":"https:\/\/www.facebook.com\/AITechNews\/","article_published_time":"2026-02-09T11:00:00+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2026\/02\/markus-spiske-Skf7HxARcoc-unsplash-scaled.jpg","type":"image\/jpeg"}],"author":"Dashveenjit Kaur","twitter_card":"summary_large_image","twitter_creator":"@ai_technews","twitter_site":"@ai_technews","twitter_misc":{"Written by":"Dashveenjit Kaur","Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.artificialintelligence-news.com\/news\/chinese-ai-models-175k-unprotected-systems-western-retreat\/#article","isPartOf":{"@id":"https:\/\/www.artificialintelligence-news.com\/news\/chinese-ai-models-175k-unprotected-systems-western-retreat\/"},"author":{"name":"Dashveenjit Kaur","@id":"https:\/\/www.ianj52.sg-host.com\/#\/schema\/person\/dae220ab53e21abc50852ff292dab19f"},"headline":"Exclusive: Why are Chinese AI models dominating open-source as Western labs step back?","datePublished":"2026-02-09T11:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.artificialintelligence-news.com\/news\/chinese-ai-models-175k-unprotected-systems-western-retreat\/"},"wordCount":1459,"publisher":{"@id":"https:\/\/www.ianj52.sg-host.com\/#organization"},"image":{"@id":"https:\/\/www.artificialintelligence-news.com\/news\/chinese-ai-models-175k-unprotected-systems-western-retreat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2026\/02\/markus-spiske-Skf7HxARcoc-unsplash-scaled.jpg","keywords":["ai","artificial intelligence","open-source"],"articleSection":["AI and Us","AI in Action","Artificial Intelligence","Deep Dives","Features","Inside AI","Open-Source &amp; Democratised AI"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.artificialintelligence-news.com\/news\/chinese-ai-models-175k-unprotected-systems-western-retreat\/","url":"https:\/\/www.artificialintelligence-news.com\/news\/chinese-ai-models-175k-unprotected-systems-western-retreat\/","name":"Exclusive: Chinese AI Models Power 175,000 Unprotected Systems as Western Labs Pull Back","isPartOf":{"@id":"https:\/\/www.ianj52.sg-host.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.artificialintelligence-news.com\/news\/chinese-ai-models-175k-unprotected-systems-western-retreat\/#primaryimage"},"image":{"@id":"https:\/\/www.artificialintelligence-news.com\/news\/chinese-ai-models-175k-unprotected-systems-western-retreat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2026\/02\/markus-spiske-Skf7HxARcoc-unsplash-scaled.jpg","datePublished":"2026-02-09T11:00:00+00:00","description":"Chinese AI models like Qwen2 now dominate 175,000 exposed systems globally as Western labs face regulatory pressure. Exclusive study reveals security risks.","breadcrumb":{"@id":"https:\/\/www.artificialintelligence-news.com\/news\/chinese-ai-models-175k-unprotected-systems-western-retreat\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.artificialintelligence-news.com\/news\/chinese-ai-models-175k-unprotected-systems-western-retreat\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.artificialintelligence-news.com\/news\/chinese-ai-models-175k-unprotected-systems-western-retreat\/#primaryimage","url":"https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2026\/02\/markus-spiske-Skf7HxARcoc-unsplash-scaled.jpg","contentUrl":"https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2026\/02\/markus-spiske-Skf7HxARcoc-unsplash-scaled.jpg","width":2560,"height":1707,"caption":"Photo by Markus Spiske\/Unsplash"},{"@type":"BreadcrumbList","@id":"https:\/\/www.artificialintelligence-news.com\/news\/chinese-ai-models-175k-unprotected-systems-western-retreat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.artificialintelligence-news.com\/"},{"@type":"ListItem","position":2,"name":"Exclusive: Why are Chinese AI models dominating open-source as Western labs step back?"}]},{"@type":"WebSite","@id":"https:\/\/www.ianj52.sg-host.com\/#website","url":"https:\/\/www.ianj52.sg-host.com\/","name":"AI News","description":"Artificial Intelligence News","publisher":{"@id":"https:\/\/www.ianj52.sg-host.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ianj52.sg-host.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.ianj52.sg-host.com\/#organization","name":"AI News","url":"https:\/\/www.ianj52.sg-host.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.ianj52.sg-host.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2025\/01\/AI-News.png","contentUrl":"https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2025\/01\/AI-News.png","width":1245,"height":238,"caption":"AI News"},"image":{"@id":"https:\/\/www.ianj52.sg-host.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/AITechNews\/","https:\/\/x.com\/ai_technews","https:\/\/www.linkedin.com\/groups\/1906826\/"]},{"@type":"Person","@id":"https:\/\/www.ianj52.sg-host.com\/#\/schema\/person\/dae220ab53e21abc50852ff292dab19f","name":"Dashveenjit Kaur","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.ianj52.sg-host.com\/#\/schema\/person\/image\/3e6156030d4e3981e2369d58108e0c16","url":"https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2024\/06\/dashveenjit-profile.jpeg","contentUrl":"https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2024\/06\/dashveenjit-profile.jpeg","caption":"Dashveenjit Kaur"},"description":"Dashveenjit is an experienced tech and business journalist with a determination to find and produce stories for online and print daily. She is also an experienced parliament reporter with occasional pursuits in the lifestyle and art industries.","url":"https:\/\/www.artificialintelligence-news.com\/news\/author\/dashveenjit\/"}]}},"authors":[{"term_id":2975,"user_id":60725,"is_guest":0,"slug":"dashveenjit","display_name":"Dashveenjit Kaur","avatar_url":{"url":"https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2024\/06\/dashveenjit-profile.jpeg","url2x":"https:\/\/www.artificialintelligence-news.com\/wp-content\/uploads\/2024\/06\/dashveenjit-profile.jpeg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.artificialintelligence-news.com\/wp-json\/wp\/v2\/posts\/112060","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.artificialintelligence-news.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.artificialintelligence-news.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.artificialintelligence-news.com\/wp-json\/wp\/v2\/users\/60725"}],"replies":[{"embeddable":true,"href":"https:\/\/www.artificialintelligence-news.com\/wp-json\/wp\/v2\/comments?post=112060"}],"version-history":[{"count":0,"href":"https:\/\/www.artificialintelligence-news.com\/wp-json\/wp\/v2\/posts\/112060\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.artificialintelligence-news.com\/wp-json\/wp\/v2\/media\/112065"}],"wp:attachment":[{"href":"https:\/\/www.artificialintelligence-news.com\/wp-json\/wp\/v2\/media?parent=112060"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.artificialintelligence-news.com\/wp-json\/wp\/v2\/categories?post=112060"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.artificialintelligence-news.com\/wp-json\/wp\/v2\/tags?post=112060"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.artificialintelligence-news.com\/wp-json\/wp\/v2\/ppma_author?post=112060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}